Amazon AWS Certified SysOps Administrator - Associate SOA-C01
Prev

There are 439 results

Next
#81 (Accuracy: 100% / 1 votes)
A company's IT department noticed an increase in the spend of their Developer AWS account. There are over 50 Developers using the account, and the Finance team wants to determine the service costs incurred by each Developer.
What should a SysOps Administrator do to collect this information? (Choose two.)
  • A. Activate the createdBy tag in the account
  • B. Analyze the usage with Amazon CloudWatch dashboards
  • C. Analyze the usage with Cost Explorer
  • D. Configure AWS Trusted Advisor to track resource usage
  • E. Create a billing alarm in AWS Budgets
#82 (Accuracy: 100% / 1 votes)
A company recently implemented an Amazon S3 lifecycle rule that accidentally deleted objects from one of its S3 buckets. The bucket has S3 versioning enabled.
Which actions will restore the objects? (Choose two.)
  • A. Use the AWS Management Console to delete the object delete markers.
  • B. Create a new lifecycle rule to delete the object delete markers that were created.
  • C. Use the AWS CLI to delete the object delete markers while specifying the version IDs of the delete markers.
  • D. Modify the existing lifecycle rule to delete the object delete markers that were created.
  • E. Use the AWS CLI to delete the object delete markers while specifying the name of the objects only.
#83 (Accuracy: 100% / 1 votes)
On a weekly basis, the Administrator for a photo sharing website receives an archive of all files users have uploaded the previous week. these file archives can be as large as 10TB in size. For legal reasons, these archives must be saved with no possibility of someone deleting or modifying these archives. Occasionally, there may be a need to view the contents, but it is expected that retrieving them can take three or more hours.
What should the Administrator do with the weekly archive?
  • A. Upload the file to Amazon S3 through the AWS Management Console and apply a lifecycle policy to change the storage class to Amazon Glacier.
  • B. Upload the archive to the Amazon Glacier with the AWS CLI and enable Vault Lock.
  • C. Create a Linux EC2 instance with an encrypted Amazon EBS volume and copy each weekly archive file for this instance.
  • D. Create a file gateway attached to a file share on an S3 bucket with the storage class S3 Infrequent Access. Upload the archives via the gateway.
#84 (Accuracy: 100% / 1 votes)
A company is using an AWS KMS customer master key (CMK) with imported key material. The company references the CMK by its alias in the Java application to encrypt data. The CMK must be rotated every 6 months.
What is the process to rotate the key?
  • A. Enable automatic key rotation for the CMK, and specify a period of 6 months.
  • B. Create a new CMK with new imported material, and update the key alias to point to the new CMK.
  • C. Delete the current key material, and import new material into the existing CMK.
  • D. Import a copy of the existing key material into a new CMK as a backup, and set the rotation schedule for 6 months.
#85 (Accuracy: 100% / 1 votes)
An organization has developed a new memory-intensive application that is deployed to a large Amazon EC2 Linux fleet. There is concern about potential memory exhaustion, so the Development team wants to monitor memory usage by using Amazon CloudWatch.
What is the MOST efficient way to accomplish this goal?
  • A. Deploy the solution to memory-optimized EC2 instances, and use the CloudWatch MemoryUtilization metric
  • B. Enable the Memory Monitoring option by using AWS Config
  • C. Install the AWS Systems Manager agent on the applicable EC2 instances to monitor memory
  • D. Monitor memory by using a script within the instance, and send it to CloudWatch as a custom metric
#86 (Accuracy: 100% / 1 votes)
A SysOps Administrator must remove public IP addresses from all Amazon EC2 instances to prevent exposure to the internet. However, many corporate applications running on those EC2 instances need to access Amazon S3 buckets. The Administrator is tasked with allowing the EC2 instances to continue to access the S3 buckets.
Which solutions can be used? (Choose two.)
  • A. Deploy a NAT gateway, and configure the route tables accordingly in the VPC where the EC2 instances are running.
  • B. Modify the network ACLs with private IP addresses in the routes to connect to Amazon S3.
  • C. Modify the security groups on the EC2 instances with private IP addresses in the routes to connect to Amazon S3.
  • D. Set up AWS Direct Connect, and configure a virtual interface between the EC2 instances and the S3 buckets.
  • E. Set up a VPC endpoint in the VPC where the EC2 instances are running, and configure the route tables accordingly.
#87 (Accuracy: 100% / 3 votes)
You have an Auto Scaling group associated with an Elastic Load Balancer (ELB). You have noticed that instances launched via the Auto Scaling group are being marked unhealthy due to an ELB health check, but these unhealthy instances are not being terminated.
What do you need to do to ensure trial instances marked unhealthy by the ELB will be terminated and replaced?
  • A. Change the thresholds set on the Auto Scaling group health check
  • B. Add an Elastic Load Balancing health check to your Auto Scaling group
  • C. Increase the value for the Health check interval set on the Elastic Load Balancer
  • D. Change the health check set on the Elastic Load Balancer to use TCP rather than HTTP checks
#88 (Accuracy: 100% / 2 votes)
A database is running on an Amazon RDS Multi-AZ DB instance. A recent security audit found the database to be out of compliance because it was not encrypted.
Which approach will resolve the encryption requirement?
  • A. Log in to the RDS console and select the encryption box to encrypt the database.
  • B. Create a new encrypted Amazon EBS volume and attach it to the instance.
  • C. Encrypt the standby replica in the secondary Availability Zone and promote it to the primary instance.
  • D. Take a snapshot of the RDS instance, copy and encrypt the snapshot, and then restore to the new RDS instance.
#89 (Accuracy: 100% / 1 votes)
As part of an operational audit, an Administrator is tasked with showing that all security responsibilities under the customer's control are properly executed.
Which of the following items is the customer responsible for providing to the auditor? (Choose two.)
  • A. Physical data center access logs
  • B. AWS CloudTrail logs showing API calls
  • C. Amazon EC2 instance system logs
  • D. Storage device destruction records
  • E. Xen Hypervisor system logs
#90 (Accuracy: 100% / 1 votes)
A system admin is planning to setup event notifications on RDS. Which of the below mentioned services will help the admin setup notifications?
  • A. AWS SES
  • B. AWS Cloudtrail
  • C. AWS Cloudwatch
  • D. AWS SNS